Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ticalc:tiemu:*:*:*:*:*:*:*:* |
Mon, 30 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ticalc
Ticalc tiemu |
|
| Vendors & Products |
Ticalc
Ticalc tiemu |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can trigger the overflow through command-line arguments passed to the application, leveraging ROP gadgets to bypass protections and execute shellcode in the application context. | |
| Title | TiEmu 2.08 Stack-Based Buffer Overflow Vulnerability | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T15:51:41.449Z
Reserved: 2026-03-28T11:42:36.850Z
Link: CVE-2017-20225
Updated: 2026-03-30T15:51:36.819Z
Status : Analyzed
Published: 2026-03-28T12:16:01.613
Modified: 2026-04-08T19:49:58.627
Link: CVE-2017-20225
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:29:32Z